Sciweavers

450 search results - page 90 / 90
» Research on Security Architecture and Protocols of Grid Comp...
Sort
View
109
Voted
EUROSYS
2010
ACM
15 years 10 months ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
MOBIHOC
2004
ACM
15 years 6 months ago
An adaptive strategy for maximizing throughput in MAC layer wireless multicast
Bandwidth efï¬ciency of wireless multicast can be improved substantially by exploiting the fact that several receivers can be reached at the MAC layer by a single transmission. T...
Prasanna Chaporkar, Anita Bhat, Saswati Sarkar
95
Voted
ICCCN
2007
IEEE
15 years 4 months ago
Implementation of a Wireless Mesh Network Testbed for Traffic Control
Wireless mesh networks (WMN) have attracted considerable interest in recent years as a convenient, flexible and low-cost alternative to wired communication infrastructures in many ...
Kun-Chan Lan, Zhe Wang, Rodney Berriman, Tim Moors...
108
Voted
EUROCRYPT
1990
Springer
15 years 4 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
MOBISYS
2010
ACM
15 years 3 months ago
NAPman: network-assisted power management for wifi devices
WiFi radios in smart-phones consume a significant amount of power when active. The 802.11 standard allows these devices to save power through an energy-conserving Power Save Mode ...
Eric Rozner, Vishnu Navda, Ramachandran Ramjee, Sh...